1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
m_a_m_a [10]
4 years ago
8

What is the purpose of using a good e-mail technique?. Demonstrate your ability to write good e-mails b. Completely describe you

r entire thought process c. Quickly get responses to your questions d. Show your consideration for others
Computers and Technology
1 answer:
densk [106]4 years ago
3 0
B. Completely describe your entire thought process
You might be interested in
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Which of the following options correctly represent a formula with Absolute References?
lakkis [162]
The answer is D =(<span>$A$1-$B$1) 

sources:just took the test</span>
3 0
3 years ago
Read 2 more answers
What are the methods of identifying publicly switched networks?
Sav [38]
I believe that the answer to the question provided above is that the <span> methods of identifying publicly switched networks is by locating the IP address if the source.</span>
Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

8 0
3 years ago
Read the following examples, and decide whether each example describes a relational database or a flat
bezimeni [28]

Answer: flat file, relational database, relational database, relational database

Explanation:

Edge

7 0
3 years ago
Read 2 more answers
What is a generic phone
Zina [86]

Explanation:

Generic Android Device means the Android devices which does not any specific brand name or they can not be related to any specific class or brand. For ex: Samsung developed Epic 4g Touch Android device but they later removed lot of fancy features and stuffs from it launched with Galaxy S.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Suggest how the following requirements might be rewritten in a quantitative way. You may use any metrics you like to express the
    7·1 answer
  • The times per second an audio file is converted from analog to digital is the ______. audio file format bandwidth sample rate wa
    5·2 answers
  • Motivation is best defined as
    9·2 answers
  • The intensity of force acting on a rock body is expressed as
    14·1 answer
  • In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
    12·1 answer
  • Create a winform application that lets the user enter a temperature. With a ComboBox object offer the user three choices for inp
    9·1 answer
  • 7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
    14·1 answer
  • Tascake Gets Free Brainliest Because he didnt get it<br><br> Tascake Heres Brainliest
    6·2 answers
  • Using the arrow key you can adjust the position of a selection in increments of
    7·1 answer
  • A computer-based information system that keeps track of the transactions needed to conduct business is a(n) ________ system.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!